Perl Best PracticesMany programmers code by instinct, relying on convenient habits or a "style" they picked up early on. They aren't conscious of all the choices they make, like how they format their source, the names they use for variables, or the kinds of loops they use. They're focused entirely on problems... | | J2EE Security for Servlets, EJBs, and Web ServicesJ2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,... | | Information Architecture with XML: A Management StrategyIn the ‘good old days’ before food labelling, sell-by dates and competitive brand promotion, you placed yourself at the mercy of your local village store manager. After the painful wait for the previous customer to bid his farewells and finally let attention turn your way, you placed your trust in the nice old guy who... |